{"id": "CVE-2024-24781", "cveTags": [], "metrics": {"cvssMetricV31": [{"type": "Primary", "source": "info@cert.vde.com", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.5, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 3.6, "exploitabilityScore": 3.9}]}, "published": "2024-02-13T14:15:46.780", "references": [{"url": "https://cert.vde.com/en/advisories/VDE-2024-013", "tags": ["Mitigation", "Third Party Advisory"], "source": "info@cert.vde.com"}, {"url": "https://cert.vde.com/en/advisories/VDE-2024-013", "tags": ["Mitigation", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Secondary", "source": "info@cert.vde.com", "description": [{"lang": "en", "value": "CWE-400"}]}, {"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "descriptions": [{"lang": "en", "value": "An unauthenticated remote attacker can use an uncontrolled resource consumption vulnerability to DoS the affected devices through excessive traffic on a single ethernet port.\u00a0"}, {"lang": "es", "value": "Un atacante remoto no autenticado puede utilizar una vulnerabilidad de consumo de recursos incontrolado para DoS en los dispositivos afectados a trav\u00e9s de un tr\u00e1fico excesivo en un \u00fanico puerto Ethernet."}], "lastModified": "2024-11-21T08:59:41.280", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:hima:f30_03x_yy_\\(com\\)_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4AC64894-A8A8-46D1-BAF2-A911B934A5B1", "versionEndIncluding": "24.14"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:hima:f30_03x_yy_\\(com\\):-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "37ADFAA8-A09E-4499-9BDE-16F19FBCEAA9"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:hima:f30_03x_yy_\\(cpu\\)_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FF7BA14B-6530-4D8F-A6C3-932719A23BE0", "versionEndIncluding": "18.6"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:hima:f30_03x_\\(cpu\\)_yy:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "59691D1B-56DC-4D6F-BB5F-B63748F3DEEC"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:hima:f35_03x_yy_\\(com\\)_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CFA6E487-D234-4880-8046-855511B23880", "versionEndIncluding": "24.14"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:hima:f35_03x_yy_\\(com\\)_:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A9757960-15A6-49D5-8DC5-203B348F9C45"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:hima:f35_03x_yy_\\(cpu\\)_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4308BD95-361E-47E3-80BC-978280F19332", "versionEndIncluding": "18.6"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:hima:f35_03x_yy_\\(cpu\\):-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F8D2C8E0-5ABC-4A7C-A836-6E16987E3AF7"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:hima:f60_cpu_03x_yy_\\(com\\)_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "26E69E53-B34E-464C-999E-5854EE1A7EE6", "versionEndIncluding": "24.14"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:hima:f60_cpu_03x_yy_\\(com\\):-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D684448D-B4ED-4F7D-9E17-CD98EC1CC119"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:hima:f60_cpu_03x_yy_\\(cpu\\)_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B63B3B7E-2D66-424A-B8AB-09E4B5C91B07", "versionEndIncluding": "18.6"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:hima:f60_cpu_03x_yy_\\(cpu\\):-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "CC4F45E4-9893-4973-A58E-0B568A2DB31C"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:hima:f-com_01_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5204C467-33AC-4E0A-9320-F417C7B3D9A7", "versionEndIncluding": "14.12"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:hima:f-com_01:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "9CA47F7D-81AB-4F9A-85E3-4247DB3AE6E3"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:hima:f-cpu_01_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A54AB214-9A91-4353-838A-8D00911C3B25", "versionEndIncluding": "14.16"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:hima:f-cpu_01:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "967A94EF-86C2-4526-83E9-1E562D511D22"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:hima:x-com_01_e_yy_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8AE3C65B-3455-4ED4-AFDF-1767DCB4DC5A", "versionEndIncluding": "15.14"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:hima:x-com_01_e_yy:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F86DDB9C-F65E-4319-93AA-BFD021397C81"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:hima:x-com_01_yy_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F531B70C-1C05-47D8-86BD-649C3F118652", "versionEndIncluding": "14.12"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:hima:x-com_01_yy:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "09FB79FD-0D7B-4E32-9E1B-B9F6E487D83B"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:hima:x-cpu_01_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A42915E6-5D54-485D-8DA3-7CFF4D2F1887", "versionEndIncluding": "14.16"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:hima:x-cpu_01:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "8CFADBD8-9E87-46F4-BFAD-F6AC87BA2416"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:hima:x-cpu_31_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C4D22E5E-6FF8-44C5-8D54-75F92129E64E", "versionEndIncluding": "14.16"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:hima:x-cpu_31:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "7DE3EBDD-0300-47B6-9B11-073AC35FD1AE"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:hima:x-sb_01_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2A681A70-12B0-47A7-82CF-A70C270DC5B9", "versionEndIncluding": "7.54"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:hima:x-sb_01:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2DFF1D55-AF2C-4F47-80FE-FF3D313EBC6C"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "info@cert.vde.com"}